mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
64 lines
2.8 KiB
JSON
64 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2024-32973",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-05-01T11:15:46.200",
|
|
"lastModified": "2024-05-01T13:01:51.263",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. In affected versions an attacker with the ability to actively intercept network traffic would be able to use a specifically-crafted certificate to fool Pluto into trusting it to be the intended remote for the TLS session. This results in the HTTP library and socket.starttls providing less transport integrity than expected. This issue has been patched in pull request #851 which has been included in version 0.9.3. Users are advised to upgrade. there are no known workarounds for this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Pluto es un superconjunto de Lua 5.4 centrado en la programaci\u00f3n de prop\u00f3sito general. En las versiones afectadas, un atacante con la capacidad de interceptar activamente el tr\u00e1fico de red podr\u00eda utilizar un certificado manipulado espec\u00edficamente para enga\u00f1ar a Pluto y hacerle confiar en que es el control remoto previsto para la sesi\u00f3n TLS. Esto da como resultado que la librer\u00eda HTTP y socket.starttls proporcionen menos integridad de transporte de lo esperado. Este problema se solucion\u00f3 en la solicitud de extracci\u00f3n n.\u00b0 851, que se incluy\u00f3 en la versi\u00f3n 0.9.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.8,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-284"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/PlutoLang/Pluto/pull/851",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/PlutoLang/Pluto/security/advisories/GHSA-84hj-7j2v-w665",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |